SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What does Windows uses the index for?
To perform very fast searches of the most common files on your computer. The easiest way to add something to the index is to include a folder in a library. When you do that - the content in that folder is automatically indexed.
8 (bits 57 - 64) /64 Allows for 256 subnets in each site.
So the downstream servers can recieve its approved updates via parent server. This allows multiple points of deployment. Downstream servers also can be delegated the permission to approve their own updates
It will prevent a user from deleting files in a folder. Granting Modify permission to the Creator Owners Group will allow users to delete the files they create but not the files of other users.
2. What should you do if a host file is missing?
You add it back to a DNS zone - clear the server DNS cache and clients DNS cache.
The Application Identity Service
Configure the enforcement points as RADIUS clients.
Delegate permission by configuring the dacl of the zone file.
3. How do you reload an active directory integrated zone from a ad database?
Vista SP1 and Server 2008 and above.
wbadmin.exe. This can backup critical files.
Us edit dnscmd /zoneupdatefromdns command.
Certain firewall rules configured for the Peer Discovery and Content Retrieval.
4. What can In-Private Browsing not display?
Through a GPO.
Suggested Sites
The DHCP server will ping an ip address before assigning it.
Modify/Create a GPO
5. What does servermanagercmd.exe do?
Problem history but also application installation history.
they are enforced and will not allow a user to exceed the space limit.
Command line equilivant of Server Manager. You can install/remove roles and features on server 2008?
Enabled searching for content on remote locations right from the Explorer itself. Integrating federated search into Windows gives users the benefits of using familiar tools and workflows to search remote data. This enhanced integration provides the a
6. How are RRAS/NPS policies evaluated?
In the registry. To bind to another computer remotly the remote registry service needs to run on the target PC.
A CONFIG.XML file
Ina periority orderd based on the permission in the priority list. The first policy that is marked True from the conditions is selected. This order of policies can affect weather or not a user can remote access (dialup - vpn - wireless).
If your computer is running slowly or isn't working properly - you can use System Restore to return your computer's system files and settings to an earlier point in time using a restore point. For more information about System Restore - see System Re
7. What is an example of a exceptions to rule?
For example - you can create a rule that allows all Windows processes to run except Registry Editor (Regedit.exe).
It is a temporary wireless profile that doesn't validate the certificate of the remote authentication dial-in user service (RADIUS) server.
Netsh add dnsserver. Example netsh interface ipv4 add dnsserver name="Local Area Connection" 192.168.0.1 index=3
SP3
8. How do you setup Ready Boost?
You will need to run "Startup Repair" from within the Windows Recovery Environment (WRE)
When you plug a ReadyBoost-compatible storage device into your computer - the AutoPlay dialog box offers you the option to speed up your PC using ReadyBoost. If you select this option - you can choose how much memory on the device to use for this pur
It will display driver signing status
A text-mode command interpreter that enables you to manage objects (disks - partitions - or volumes) by using scripts or direct input at a command prompt.
9. You can configure ____________ in group policy.
IPV4 and IPV6
It is the authentication header protocol and digitally sign packets but not encrypt them.
Use the Programs and Features Control Panel applet to
DNS suffix search lists
10. What is a NPS server?
A user to submit a print job to a printer and manage their own print jobs through the "Manage Documents" permission granted to the Creator Owners Group. If you grant a user "Manage Documents" - then they can manage ALL jobs submitted to that printer.
Enterprise Admins
Add an AD integrated zone
A network policy server. It is microsofts implementation of RADIUS server and replaces the IAS (internet authentication service) from windows 2003.
11. How do you upgrade windows vista to windows 7?
The DFS service attempts to keep the domain based namespace highly consistent by polling the pcd emulator after the namespace changes. This bypasses the needing to wait for the ad replication to update the namespace object. This can increase load on
ISATAP - Teredo and 6to4
Boot into Windows Vista to initiate a direct upgrade to Windows 7 - insert the Windows 7 setup DVD - run SETUP.EXE and choose the Upgrade option. Do not boot directly to the setup DVD.
Prevents the server from performing Internet name resolution.
12. How do you connect to a wireless access point is not broadcasting its SSID?
Some information—such as cookies and temporary Internet files—so that the webpages you visit will work correctly. However - at the end of your InPrivate Browsing session - this information is discarded.
The DFS service attempts to keep the domain based namespace highly consistent by polling the pcd emulator after the namespace changes. This bypasses the needing to wait for the ad replication to update the namespace object. This can increase load on
By creating or modifying a wireless connection in Network and Sharing Center.
Configure the primary zone to transfer to only DNS servers listed on the names server tab or by ip address.
13. What does IMAGEX /MountRW do?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
14. Who can run the Windows Easy Transfer Wizard?
First the local link address sends a router discovery packet (Router Solicitation message). If the router request is received then a Public address corrosponding to the global or unique local address prefix in the message.
Only a local administrator
To perform very fast searches of the most common files on your computer. The easiest way to add something to the index is to include a folder in a library. When you do that - the content in that folder is automatically indexed.
Netsh set dnsserver. Example: netsh interface ipv4 set dnsserver name="Local Area Connection" source=static address=192.168.0.100
15. How can you restrict users to create sub-folders in a dfs root share?
The system will shut down. The next time you start this system (after cloning it) - it will install with the settings in the XML file. The Computer Name will be automatically generated.
So the downstream servers can recieve its approved updates via parent server. This allows multiple points of deployment. Downstream servers also can be delegated the permission to approve their own updates
Restrict the share permissions of the DFS root share.
It designates an authoritative DNS server - not the soa record.
16. What is a bootstrap wireless profile?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
17. What do you do if the Operating System won't start due to a corrupt driver?
Windows PE and Windows.old.
A new feature for Offline Files & Folders. Prior to Windows 7 - to open a file across a slow network - client computers always retrieved the file from the server - even if the client computer had recently read the file. With Windows 7 transparent cac
You can add more space to existing primary partitions and logical drives by extending them into adjacent unallocated space on the same disk. To extend a basic volume - it must be raw or formatted with the NTFS file system.
Use Safe Mode and then roll back the driver if it was recently updated.
18. What are the ESRB Ratings?
Pool Active Directory.
Run Disk Cleanup and click Clean up system files. If you are prompted for an administrator password or confirmation - type the password or provide confirmation. Click the More Options tab - under System Restore and Shadow Copies - click Clean up. In
EARLY CHILDHOOD - EVERYONE - EVERYONE 10+ - TEEN - MATURE - ADULTS ONLY - RATING PENDING
Add an AD integrated zone
19. What does it mean to Extend a Basic Disk Volume?
Can be used to create virtual hard disks
You can add more space to existing primary partitions and logical drives by extending them into adjacent unallocated space on the same disk. To extend a basic volume - it must be raw or formatted with the NTFS file system.
Clients establish an IPsec tunnel for the IPv6 traffic to the DirectAccess server - which acts as a gateway to the intranet. The DirectAccess client establishes two IPsec tunnels: Psec Encapsulating Security Payload (ESP) tunnel and IPsec ESP tunnel.
Offline migration is a new scenario in which enables the ScanState tool to run inside a different Windows operating system than the Windows operating system from which ScanState is gathering files and settings.
20. What is the command to add a DNS server?
Windows Aero was revised to be more touch-friendly.
Attach to the VHD file created by Windows Backup. You can attach to a VHD file using Disk Management or DISKPART
Use AD integrated zones so the clients can update to more than one DNS server.
Netsh add dnsserver. Example netsh interface ipv4 add dnsserver name="Local Area Connection" 192.168.0.1 index=3
21. What controlls file extensions?
Install NAP on the computer with the DHCP service.Configure NAP as a RADIUS proxy and forward connection requests to the RADIUS server.
The Default Programs Control Panel applet
All Programs - Windows Virtual PC - Windows XP Mode Applications. To run your application directly from the Windows 7 desktop - just go to your Start menu.
It can be used to configure an unattended install of Windows 7. The answer file is now an XML file instead of an INF file. You should to use Windows System Image Manager to create the XML file. To use this XML file - copy it to c:windowssystem32syspr
22. How do you configure DHCP to ignore clients on a particular subnet?
By unbinding the DHCP protocol from the nic attached to the subnet.
Windows PE and Windows.old.
DNS suffix search lists
It can be used to configure an unattended install of Windows 7. The answer file is now an XML file instead of an INF file. You should to use Windows System Image Manager to create the XML file. To use this XML file - copy it to c:windowssystem32syspr
23. What is a mx record?
By caching reads to remote files over a slow network in the Offline Files (CSC) cache. Subsequent reads to the same file are then satisfied from the client (cache) after verifying the integrity of the cached copy.
A roecord to indicate the smtp server.
It backs up digitally identities to a password protected file.
By unbinding the DHCP protocol from the nic attached to the subnet.
24. What OS can be upgraded to Windows 7?
IN the WindowsUpdateClient log in the system log portion of event viewer.
It will prevent a user from deleting files in a folder. Granting Modify permission to the Creator Owners Group will allow users to delete the files they create but not the files of other users.
The DHCP server will ping an ip address before assigning it.
Only Windows Vista can be directly upgraded to Windows 7 and only if you upgrade within the same processor architecture (X86 or X84).
25. When you install an application in Windows Virtual PC - Windows XP Mode - where does it automatically creates a Windows 7 Start Menu Shortcut under?
All Programs - Windows Virtual PC - Windows XP Mode Applications. To run your application directly from the Windows 7 desktop - just go to your Start menu.
Problem history but also application installation history.
The DHCP server will ping an ip address before assigning it.
It create a report of which files will be migrated
26. What do Print permission only allows?
A .WFW file
One of the tunnels if DirectAccess by using a computer certificate. This tunnel provides access to an intranet Domain Name System (DNS) server and domain controller - allowing the computer to download Group Policy objects and to request authenticatio
Configure the primary zone to transfer to only DNS servers listed on the names server tab or by ip address.
A user to submit a print job to a printer and manage their own print jobs through the "Manage Documents" permission granted to the Creator Owners Group. If you grant a user "Manage Documents" - then they can manage ALL jobs submitted to that printer.
27. What is DiskPart?
Pool Active Directory.
A text-mode command interpreter that enables you to manage objects (disks - partitions - or volumes) by using scripts or direct input at a command prompt.
A type of port forwarding that allows public network computers on a Private network through nat devises.
Run slmgr.vbs -ato and then open up 3389 on windows firewall using netsh.
28. What does DRIVERQUERY /SI do?
It will display driver signing status
Writes changes to a mounted WIM file - DISM /UNMOUNT-WIM /DISCARD will roll the changes back
Also known as root scalability mode. Allows organizations with more than 16 namespace servers use consistency mode. They poll the nearest dc every hour instead of the pdc emulator. This reduces network traffic to the pdc emulator but clients might ha
L2TP/IPSEC with EAP-TLS.
29. What does IP Helper service has to run for?
The domain profile not the public or private.
Divide up a large WIM file into multiple smaller .SWM files
By either using WSUS management console (server side targeting) or GPO (client side targeting).
IPV6 transition technologies
30. What drive is System protection is automatically setup on?
From the Network Policy Access Services role in system manager.
Either by placing data on a web server and enforcing ssl to be used to download or by using IPSEC on a file share.
Default Programs Control Panel applet
For the drive that Windows is installed on. System protection can only be turned on for drives that are formatted using the NTFS file system.
31. What is Bcdboot?
BCD boot file creation and repair tool. The bcdboot.exe command-line tool is used to copy critical boot files to the system partition and to create a new system BCD store.
It improves performance
No
8 (bits 57 - 64) /64 Allows for 256 subnets in each site.
32. Where must SSL certificates must be issued by?
Comes with the Windows Automated Installation Kit (WAIK)
A CA users trust or they will get error messages when trying to securely access a web site. They can avoid the error by installing the CA certificate to the Trusted Root Certificate Store.
Use SYNC Center
A user to submit a print job to a printer and manage their own print jobs through the "Manage Documents" permission granted to the Creator Owners Group. If you grant a user "Manage Documents" - then they can manage ALL jobs submitted to that printer.
33. What can storage reports be used for?
Yes - it can be modified to apply to a network location.
L2TP/IPSEC with EAP-TLS.
Duplicate file identification - disk usage patterns - dormant files identification - and audit screening.
For example - you can create a rule that allows all Windows processes to run except Registry Editor (Regedit.exe).
34. How do you display detailed Windows Activation and License status?
The first time a user opens a file in a shared folder - Windows 7 reads the file from the server and then stores it in a cache on the computer's hard disk drive. The second and subsequent times a user reads the same file - Windows 7 retrieves the cac
Specify this file with both the ScanState and LoadState tools to migrate all user folders and files that resides on the root of any drive and in the Users directory. However - it does not find and migrate any application data - program files - or any
Run: Cscript slmgr.vbs /dl
Use the Cipher.exe command line tool.
35. What is WinRS?
It governs remote access and a user must meet the conditions of at least one of the policies.
First the local link address sends a router discovery packet (Router Solicitation message). If the router request is received then a Public address corrosponding to the global or unique local address prefix in the message.
It create a report of which files will be migrated
It is a command-line tool which relies on Windows Remote Management (WinRM) to execute remote commands. The basic syntax for WinRS commands is as follows: winrs -r:target command - where target is the name (NetBIOS or FQDN) of the remote computer tha
36. What are the minimum hardware requirements for Windows 7?
The DFS service attempts to keep the domain based namespace highly consistent by polling the pcd emulator after the namespace changes. This bypasses the needing to wait for the ad replication to update the namespace object. This can increase load on
1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor - 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit) - 16 GB available hard disk space (32-bit) or 20 GB (64-bit) - DirectX 9 graphics device with WDDM 1.0 or higher driver
A new feature for Offline Files & Folders. Prior to Windows 7 - to open a file across a slow network - client computers always retrieved the file from the server - even if the client computer had recently read the file. With Windows 7 transparent cac
A scheduled task that runs by default collecting information for the Reliability monitor. If disabled it must reenabled manually from the task scheduler mmc snapin.
37. What is IPsec ESP tunnel?
Only Business Track Windows 7 editions (Professional - Enterprise - Ultimate).
Ina periority orderd based on the permission in the priority list. The first policy that is marked True from the conditions is selected. This order of policies can affect weather or not a user can remote access (dialup - vpn - wireless).
One of the tunnels if DirectAccess by using both a computer certificate and user credentials. This tunnel authenticates the user and provides access to intranet resources and application servers.
WINRM QUICKCONFIG.
38. How do you route IPV6 traffic on your private network?
Extensive Authentication Protocol used in PPP authentication.
an email address where the @ is replaced with a period.
Use IPV6 Unique Local Addresses.
Use SYNC Center
39. How do you upgrade windows 7?
Windows 7 Professional.
All you have to do is purchase an upgrade key from Microsoft or another authorized retailer to unlock those new features.
Use Safe Mode and then roll back the driver if it was recently updated.
Comes with the Windows Automated Installation Kit (WAIK)
40. How does Transparent Caching lead to improved end-user response times and decreased bandwidth consumption over the WAN links to the server?
For the drive that Windows is installed on. System protection can only be turned on for drives that are formatted using the NTFS file system.
By caching reads to remote files over a slow network in the Offline Files (CSC) cache. Subsequent reads to the same file are then satisfied from the client (cache) after verifying the integrity of the cached copy.
dynamic drives
Use dnscmd /zonerefresh.
41. What does sysprep /generalize /oobe /shutdown /unattend:sysprep.xml?
Use AD integrated zones so the clients can update to more than one DNS server.
Sent across the network
The system will shut down. The next time you start this system (after cloning it) - it will install with the settings in the XML file. The Computer Name will be automatically generated.
They are designed to provide concise and impartial information about the content in computer and video games so consumers - especially parents - can make an informed purchase decision. ESRB ratings have two equal parts: rating symbols suggest age app
42. NAP can be configured to ____________.
Enforce IPSEC on the network
Through Group Policy at Computer configuration | Administrative Templates | Network | Offline Files | Enable Transparent Caching.
At the volume level - not the drive level.
An authentication method that completes user authentication before you establish a full Remote Desktop connection and the logon screen appears. This can help protect the remote computer from hackers and malicious software.
43. How can you removed a stale resource record from DNS?
By running the Update Status summary report.
Boot to a Windows 7 setup DVD and run System Restore or boot to a System Repair Disk.
Only Business Track Windows 7 editions (Professional - Enterprise - Ultimate).
Configure aging and scavenging.
44. What is a NAT forwarding?
A type of port forwarding that allows public network computers on a Private network through nat devises.
If your computer is running slowly or isn't working properly - you can use System Restore to return your computer's system files and settings to an earlier point in time using a restore point. For more information about System Restore - see System Re
dynamic drives
L2TP/IPSEC with EAP-TLS.
45. IPV6 is _____ on Windows 2000
By creating or modifying a wireless connection in Network and Sharing Center.
Not supported
8 (bits 57 - 64) /64 Allows for 256 subnets in each site.
Subtract the number of bits in the mask from 32 bits (255.255.255.255). Take the result (x) and have 2 to the power of the result (2^x). Subtract that final result by 2 and that is the amount of host addresses available.
46. How do you configure IPSEC?
Promiscuous mode allows you to monitor another machine without installing network monitor on the PC you are trying to monitor.
Use IPV6 Unique Local Addresses.
Assign a ipsec policy to all computers - verify the computers can manually authenticate. Assign a client respond only IPSEC policy to the computers. Also either the request server or the security server need IPSEC polices assigned.
vssadmin.exe. This can view previous version files as well.
47. How many bits are in the site subnet?
Use SYNC Center
System Restore Points as well as Previous Versions of Files (configured through the System applet).
By running the Update Status summary report.
8 (bits 57 - 64) /64 Allows for 256 subnets in each site.
48. What command is used to view the network monitor via command line?
Used to control power settings and configure computers to default to Hibernate or Standby modes. For example - running Powercfg.exe -energy will analyze the computer for energy efficiency.
NMCAP. You can initiate a packet capture and make a .cap file to replay later. It allows you to accept a .cap files as input useful in parsing traffic by different ports or ip address. Example: NMCap /inputcapture test.cap /capture IPV4.Address ==10.
Generates a space-estimate file called Usmtsize.txt. This option does not collect the user state. You must also specify /nocompress.
Computer certificates be installed on client computers
49. What versions of Windows 7 support Bitlocker Drive Encryption?
Boot Configuration Database - Boot Configuration Data (BCD) files provide a store that is used to describe boot applications and boot application settings. The objects and elements in the store effectively replace Boot.ini.
They are AAAA records.
Use the Programs and Features Control Panel applet to
Enterprise and Ultimate versions. The limitation refers only to the ability to enable protection on a removable storage device. Once BitLocker To Go is added to a storage device - that device can be used normally with any version of Windows 7. It can
50. What requirements needs to be met to use network level authentication?
It can speed up your computer by using storage space on most USB flash drives and flash memory cards. ReadyBoost is designed to help when your PC's memory is running low. Low memory can make your computer sluggish because Windows - which needs a plac
At the volume level - not the drive level.
Client needs Remote Desktop Connection 6.0 or above - Client must use an os that supports CredSSP (Credential Security Support Providoer) - The terminal server must user windoes 2008 and above.
Take the number of networks and take the square root of it. Subtract that number from the subnet mask. The result is the original mask.